¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
¸ð¹ÙÀÏ ÀüÀÚIDÁö°© ¿î¿ëÀ» À§ÇÑ NFC ±â¼ú ºÐ¼®
An analysis of NFC technology for Operating Mobile Digital ID Purse
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2009³â Ãß°èÇмú´ëȸ (2009³â 11¿ù)
µ¥ÀÌÅÍ ¸¶ÀÌ´×À» ÀÌ¿ëÇÑ ¸ÂÃãÇü µ¥ÀÌÆ® ÄÚ½º Ãßõ ¼ºñ½º
Classified Recommendation Service of Date Course using Data Mining
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2009³â Ãß°èÇмú´ëȸ (2009³â 11¿ù)
À¥µ¥ºê ±â¹Ý Çù¾÷½Ã½ºÅÛ¿¡¼ÀÇ Á¢±Ù Á¦¾î °ü¸®
Management of the Access Control for a WebDAV-based Collaborative System
Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ³í¹®Áö (2010³â 2¿ù)
Æ÷·»½Ä Á¶»ç¸¦ À§ÇÑ À©µµ¿ì ºñ½ºÅ¸ º¸¾È ü°è ºÐ¼®
Analysis of Windows Vista Security System for Forensic Examination
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2008³â 6¿ù)
¼ºñ½ºÁöÇâ ¿ÂÅç·ÎÁö¸¦ À§ÇÑ ¿ÂÅç·ÎÁö Æò°¡¹æ¹ý
A Ontology Evaluation Method for Service Oriented Ontology
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2009³â Ãá°èÇмú´ëȸ (2009³â 4¿ù)
[ƯÁý¿ø°í I] N-Screen ¼ºñ½º ÇöȲ ¹× ¿¬±¸ °³¹ß À̽´
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2011³â 7¿ù)
[ƯÁý¿ø°í] Â÷¼¼´ë À¥¿¡¼ÀÇ UI/UX ±â¼ú µ¿Çâ
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2011³â 8¿ù)
µðÁöÅÐ ÇÁ¸°ÅÍÀÇ º¸¾È±â´É ½ÃÇè/Æò°¡¹æ¹ý·Ð °³¹ß
Development Testing/Evaluating Methods about Security Functions based on Digital Printer
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2009³â 8¿ù)
¸®´ª½º ºÎÆ® °úÁ¤ ÃÖÀûȸ¦ À§ÇÑ SSD ¼º´ÉÆò°¡
Performance Analysis of SSD for Optimized Boot-up in the Linux
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2009³â Ãß°èÇмú´ëȸ (2009³â 11¿ù)
Ŭ¶ó¿ìµå ÄÄÇ»Æÿ¡¼ÀÇ ´ë¿ë·® µ¥ÀÌÅÍ Ã³¸®¿Í °ü¸® ±â¹ý¿¡ °üÇÑ Á¶»ç
Massive Data Processing and Management in Cloud Computing: A Survey
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö D - µ¥ÀÌŸº£À̽º (2011³â 4¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.